How Ransomware Works – And What You Can Do to Stop It

From Darkside, to Lockbit, to Conti, ransomware gangs pulled off many headline-making attacks in the last year and they have evolved their techniques to become more stealthy and sophisticated when targeting organizations. In this webinar, experts walk you through the steps these gangs and affiliates often take to breach a network and then move around, undetected, in preparation for a future ransomware attack. We will then examine which tools and strategies should be put in place in order to defend against the disruptive and damaging incidents.

Available:
Thu, Jul 14, 2022 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attend this webinar and you'll:

  • Gain new insights to the evolving tricks and deceptions used by online criminals to capture your servers and desktops.
  • Discover new ways to identify dormant ransomware threats — and effectively eradicate them.
  • Devise new tactics and strategies to minimize your organization's risk and exposure to ransomware.
  • Be better able to identify anomalous conditions in your network that could be red flags for ransmoware infection.

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • John Wood
    John Wood
    Consulting Director
    Palo Alto Networks | Unit 42

    As a director at Unit 42, John Wood brings more than three decades of experience in cybersecurity and law enforcement, most notably as a Special Agent with the Federal Bureau of Investigation and more recently leading an incident response practice in the private sector. A highly regarded expert in digital forensics, memory analysis, and incident response, he has deep experience leading teams of investigators in high-profile and complex criminal cases. John has worked on FBI investigations into Edward Snowden, General David Petraeus, and Russian election intrusion in the 2016 U.S. Presidential election. He has a top secret U.S. government security clearance and has frequently provided expert witness testimony in court.

  • Becky Bracken
    Becky Bracken
    Editor
    Dark Reading

    Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.

Sponsored By